Preferred Language
Articles
/
0hegNY8BVTCNdQwCrWHd
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the effectiveness of the applied method was verified through an example.

Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Universities Governance Accourding to Incremental Approach for Strategic Decision
...Show More Authors

The research's purpose is to highlight the role that the Approach of the strategic decision play in universities' governorships, assuming that the universities' governorship are definite result that can be reached by modern universities through their active strategic decisions that they take based on the correct way of thinking and the appropriate entrance that achieve the strategic goal of these decisions. The current research depended on two curriculums necessitated by the research requirement which are the analytical description curriculum and compare curriculum, the field research was done in the (Baghdad and Al-Mustansiriya) universities, the samples that were selected were the president, assistants and members of the board'

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 22 2024
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
New Approach for Solving Three Dimensional Space Partial Differential Equation
...Show More Authors

This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.

       Finally, all algori

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Pure And Applied Mathematics
Linear Regression Model Using Bayesian Approach for Iraqi Unemployment Rate
...Show More Authors

In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Systems Science And Mathematical Sciences
SCREENING TESTS FOR DISEASE RISK HAPLOTYPE SEGMENTS IN GENOME BY USE OF PERMUTATION
...Show More Authors

The haplotype association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease.Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls.It starts with inferring haplotypes from genotypes followed by a haplotype co-classification and marginal screening for disease-associated haplotypes.Unfortunately,phasing uncertainty may have a strong effects on the haplotype co-classification and therefore on the accuracy of predicting risk haplotypes.Here,to address the issue,we propose an alternative approach:In Stage 1,we select potential risk genotypes inste

... Show More
View Publication
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Assessment of risk factors for myocardial infarction and its relationship with some variables
...Show More Authors

The aim of the study is to assess the risk factors which lead to myocardial infarction and relation to some variables. The filed study was carried out from the 1st of April to the end of Sept. 2005. The Sample of the study consisted of (100) patients in lbn-Albeetar and Baghdad Teaching Hospital. The result of the study indicated the following; 45% of patients with age group (41-50) were more exposed to the disease and there is no significant difference was seen in the level of education, Martial status, weight and height. The result shows that there are significant difference in risk factors like hypertension, cholesterol level in blood and diabetes. When analyzed by T.test at level of P < 0.01 and there are significant difference in smoki

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2030
Journal Name
Al-kindy College Medical Journal
The Functional Results of Surgical Percutaneous Joystick Reduction Therapy for Isolated Severely Angulated Radial Neck Fracture in Children
...Show More Authors

Background: Radial neck fractures in children account for 5 to 10% of all elbow fractures in children. They are extra-articular fractures of the radius proximal to the bicipital tuberosity. The physis is typically involved as a Salter-Harris I or II pattern. Alternatively, the fracture sometimes is extraphyseal, through the metaphysis. In children there is considerable potential for remodeling after these fractures. Up to 30° of radial head tilt and up to 3 mm of transverse displacement are acceptable. Many modalities of treatment are available regarding Surgical &Non-Surgical treatments. Objectives: To evaluate the functional outcome after surgical percutaneous joystick reduction therapy of severely angulated radial neck fracture i

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 24 2020
Journal Name
Al-kindy College Medical Journal
The Functional Results of Surgical Percutaneous Joystick Reduction Therapy for Isolated Severely Angulated Radial Neck Fracture in Children
...Show More Authors

Background: Radial neck fractures in children account for 5 to 10% of all elbow fractures in children. They are extra-articular fractures of the radius proximal to the bicipital tuberosity. The physis is typically involved as a Salter-Harris I or II pattern. Alternatively, the fracture sometimes is extraphyseal, through the metaphysis. In children there is considerable potential for remodeling after these fractures. Up to 30° of radial head tilt and up to 3 mm of transverse displacement are acceptable. Many modalities of treatment are available regarding Surgical &Non-Surgical treatments. Objectives: To evaluate the functional outcome after surgical percutaneous joystick reduction therapy of severely angulated radial neck fracture i

... Show More
View Publication Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educati

... Show More
View Publication Preview PDF